The Question is:
I am getting the error below when excectuing a program. How can this be resolved?
%SYSTEM-F-ACCVIO, access violation, reason mask=00, virtual address=00001B40,
%TRACE-F-TRACEBACK, symbolic stack dump follows
Image Name Module Name Routine Name Line Number rel PC abs PC
SI$DBMS_IO_R 0 001BA034 005B8034
SI$DBMS_IO_R 0 001D32DC 005D12DC
SI$DBMS_IO_R 0 001A02A4 0059E2A4
ABADC2 ABADC2 ABADC2 4104 00001944 00031944
ABADC2 0 0002555C 0003555C
0 8BBD2170 8BBD2170
%SYSTEM-F-ACCVIO, access violation, reason mask=00, virtual address=202020E7,
Improperly handled condition, image exit forced.
Signal arguments: Number = 00000005
Name = 0000000C
R0 = 2020202020202020 R1 = 0000000000020604 R2 = 00000000001254A0
R3 = 0000000000000004 R4 = 0000000000000003 R5 = 0000000000134080
R6 = 00000000004856C0 R7 = 0000000020202020 R8 = 000000007FF9C1F8
R9 = 000000007FF9C400 R10 = 000000007FF9D228 R11 = 000000007FFBE3E0
R12 = 000000007EE5DAA8 R13 = 00000000000109E0 R14 = 0000000000000000
R15 = 000000007EF01DA0 R16 = 2020202000000000 R17 = 0000000000134320
R18 = 0000000000000000 R19 = 0000000020202020 R20 = 0000000000000000
R21 = 0000000000000000 R22 = 0000000000000001 R23 = 0100000000000000
R24 = 0000000000000001 R25 = 0000000000000003 R26 = 00000000000C10B4
R27 = 00000000001253F8 R28 = 0000000000000000 R29 = 000000007EE5D3B0
SP = 000000007EE5D3B0 PC = 00000000000C1098 PS = 300000000000001B
The Answer is :
Please see HELP/MESSAGE ACCVIO for information on the specific
meaning and contents of the ACCVIO error -- extensive details
of the Access Violation are provided with the ACCVIO error.
Based on the presence of hexidecimal 20 byte in R0, in the failing
program counter, and elsewhere, it would appear that critical data
on the program stack has been overwritten with space characters.
Please see topics (819), (837), (1246), (2223), (2234), (3215),
(5533), and very likely other topics here in Ask The Wizard.
Please contact (or continue to work with) the application vendor(s),
as source code access is normally required when debugging access
violation errors -- ignoring any approach involving the rather
extensive effort involved in reverse-engineering (if such effort
is permitted or prohibited by applicable software licenses and by
applicable legal requirements, such as the DMCA in the US) the
application binaries involved, of course.